Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Avoiding Mistakes

By Ken Stasiak
April 1, 2008
There are numerous mistakes that enterprises and their chief security officers make when planning to protect valuable corporate data.


It’s natural. Mistakes are made in security everyday, causing companies scrambling to recover from breaches that have compromised some of, if not all, important corporate data.  It’s also apparent that most breaches occur from mistakes that could be avoided. 

The five following mistakes are the most common.   

MISTAKE NUMBER 1: NOT KNOWING WHERE YOUR SENSITIVE DATA RESIDES

A lot of enterprises and their chief security officers are unaware of where their sensitive data resides. This is a large problem because it forces a reactive approach to securing their data.  Even worse, they struggle with the question of what data was compromised.  Many regulations, including the Payment Card Industry standard, “scope the environment” for sensitive data as the first step in determining the complexity to secure or become compliant.  Once process mapping has occurred, companies can apply appropriate security to the “segmented environment” and manage the associated risk. Gramm-Leech-Bliley (GLBA) requires all financial organizations, including credit unions, to perform a risk assessment.  Part of any risk assessment is to perform a mapping to high value business process; map the data associated and correlate it to the underlying infrastructure, thus producing a true identification of risk.

As with all regulations and security frameworks, the ability to respond to a breach is critical. Performing a risk assessment or process mapping makes it much easier to respond.

MISTAKE NUMBER 2: NOT CLASSIFYING DATA

What type of data do you store, process or transmit that should be protected? Most enterprises do not classify their data, hence they protect critical data the same as non-sensitive data.

One area that the federal government has excelled in for many of years over the private sector (commercial) is classification of data.  The federal government has invested significant funds to protect classified data.  An integral part of classification of data is compartmentalizing.  Simply put, it is splitting up or segmenting data based on type.  Understand what data you store, process or transmit (Mistake number 1), then you can group systems and business processes that only use those data elements.  In some instances, you may have several data elements that are used.  When this occurs, the ability to cross matrix data security requirements (maybe regulatory also) becomes essential.

MISTAKE NUMBER 3: NOT SECURING DATA THROUGHOUT ITS FULL LIFE SPAN

A common misconception among enterprises and their security operations is that once the data leaves their “control” they no longer have an obligation to protect it.

A very easy way to define ownership of data is if the data originates with you, you own it, PERIOD!  This author’s long time mentor and now CISO of Diebold, Scott Angelo, would also say “cradle to grave,” you must protect the information until it is properly destroyed or rendered unusable.  A good example is a commerce site. Developed by a third party Web company, hosted by a hosting provider and managed by a managed service company, in this relationship all parties share in the responsibility of securing the data.

MISTAKE NUMBER 4: COMPLIANCE-BASED SECURITY

Some companies are still waiting for regulatory compliance to drive their security organization and, consequently, their budgets. It is this author’s belief the audits audit and security secures.

This means that using regulatory compliance as a primary driver and framework for securing the enterprise will never properly secure the data. The biggest problem with security today is obtaining budget. This can easily be solved by presenting the risk to top management and allowing him or her to accept the risk or mitigate (obtaining budget) the risk.  Either way you do not own the risk anymore.  However, to understand the risks, you must perform frequent assessments and consistently report changes in the overall risk posture. 

MISTAKE NUMBER 5: HAVING COMPANIES WITHOUT EXPERTISE HANDLING SECURITY

Well this seems like a no brainer, but there are some companies that rely on their security from their service providers. While this has its economical advantages, it will not make the enterprise secure.  Having a security firm that specializes in information protection, specifically, the data you are trying to protect, will greatly increase your return on investment. 

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ken Stasiak is co-founder and CEO of SecureState LLC, an information security assessment and protection firm, Cleveland, Ohio.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

University lecture

1.2M Individuals’ Data Stolen In University Hacking

Email app

40B Records Exposed From Marketing and Email Data Platform

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Security Job Search

    Mistakes to avoid in your security job search

    See More
  • Avoiding Nuisance Alarms with Automatic Threat Assessment

    See More
  • SEC_Web_5Minutes-Shea-0122_1170x658.jpg

    5 minutes with Teresa Shea: Avoiding cyberattacks

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing